Introducing the Sophos MSP Elevate program
Accelerating MSP business growth and elevating customers’ defenses with differentiated cybersecurity products and services.
Georgia Sweeting reports: The UK government has announced the full scope of its upcoming Cyber Security and Resilience Bill, which aims to strengthen the country’s digital defences and reduce the growing risks posed by cyber threats. Set to be introduced later this year, the bill will place tougher cybersecurity requirements on organisations that provide essential services,…
Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system’s primary disk and render it unbootable. The names of the packages are listed below – github[.]com/truthfulpharm/prototransform github[.]com/blankloggia/go-mcp github[.]com/steelpoor/tlsproxy “Despite appearing legitimate,
Brandon Vigliarolo reports: The US government’s Login.gov identity verification system could be one cyberattack, or just a routine IT hiccup, away from serious trouble, say auditors, because it hasn’t shown its backup testing policy is actually in use or effective. The US Government Accountability Office reported Tuesday that Login.gov, which is managed by the federal government’s General…
The Korea JoongAng Daily reports: Financial regulators have ordered Lotte Card to set up a dedicated call center for victims of a recent hacking incident and to prepare procedures for full compensation in cases of any fraudulent card use. The order comes after a cyber breach was reported at the company with 9.65 million individual……
A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of a law enforcement seizure. Chaos, which sprang forth in February 2025, is the latest entrant in the ransomware landscape to conduct big-game hunting and double…
Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can hold your business back from unlocking its full potential. The truth is,…